Podcast
Questions and Answers
What is the process of altering readable data into unreadable form to prevent unauthorized access?
What is the process of altering readable data into unreadable form to prevent unauthorized access?
- Compression
- Encoding (correct)
- Transposition
- Decryption
What are unencrypted messages known as?
What are unencrypted messages known as?
- Cybertext
- Encoded text
- Ciphertext
- Plain text (correct)
What is the term for encrypted text?
What is the term for encrypted text?
- Cybertext
- Ciphertext (correct)
- Plain text
- Encoded text
What is used to encrypt and decrypt coded messages?
What is used to encrypt and decrypt coded messages?
What does encryption use to create coded messages that are difficult to break?
What does encryption use to create coded messages that are difficult to break?
What is the process of altering readable data into unreadable form to prevent unauthorized access?
What is the process of altering readable data into unreadable form to prevent unauthorized access?
What does encryption use to create coded messages that are difficult to break?
What does encryption use to create coded messages that are difficult to break?
What are unencrypted messages known as?
What are unencrypted messages known as?
What is used to encrypt and decrypt coded messages?
What is used to encrypt and decrypt coded messages?
What is the term for encrypted text?
What is the term for encrypted text?